Posts By: Jacob Charles

Identity confirmed

Nick Larter reveals how digital passports are making travel experiences smoother From passports to ID cards to driver’s licenses, many government documents already have a digital counterpart. But we are only using a small fraction of what digital identity technology can actually do. Its widespread use will not only open up countless new applications and… Read more »

SIGINT versus TSCM

Paul D Turner advances the art and science of the SIGINT/TSCM role During the past decade, technology advancements have shaped the software-defined radio environment within a Signals Intelligence (SIGINT) and Technical Surveillance Countermeasures (TSCM) role. SIGINT/TSCM have seen industry disruptive advancements at the hardware and software level with algorithmic coding to address technical challenges. A… Read more »

Red alert

Matthew Borie examines the Yemeni Houthi Iranian-backed militant group attacks amid the Israel-Hamas conflict In wake of the Hamas attacks from Gaza on Israel, which began on 7 October, the Yemeni Houthi Iranian-backed militant group (IBMG) has initiated a campaign of attacks targeting Israeli territory as well as against commercial and military vessels in the… Read more »

Under the influence

Jorge Marinho and Júlio Ventura consider lawfare and foreign influence on politicians as he examines NATO and Portuguese internal intelligence service insights Politicians can be the targets of influence operations directly or indirectly conducted by adversary states, by turning to various instruments such as the media and lobbying firms, for instance. In this case, influence… Read more »

Stay on target

Laura Libeer highlights eight ways to bolster your cyber security resources without blowing your budget IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a Data Breach Report 2023 UK organisations shell out an average of £3.4-million for data breach incidents. There isn’t a CISO around that doesn’t wish… Read more »

A false economy

Jamal Elmellas looks at whether the short-term fix of cutting costs could have harmful long-term consequences Over the course of the past year, we’ve seen businesses look to make the security function more efficient and streamlined which has inevitably led to cutbacks. Contraction in spend has also hit vendors, some of which have cut their… Read more »

Canine guardians

James Fee explores the multifaceted ways in which dogs can be harnessed for security Detection dogs possess an uncanny sense of smell, capable of detecting even the faintest of scents. This innate ability has led to their use in detecting contraband substances such as drugs and explosives at airports, border crossings and events. Their accuracy… Read more »

The complete package

Lucy Ketley delves into the fundamentals of physical and cyber security convergence The exploitation of the internet for radicalisation and research means that many abhorrent hostile vehicle terror attacks now originate in the digital realm. This has likely been the case for several years. And although hostile vehicle threat levels are generally low, the digital… Read more »

2023: lessons learned

Eric Boger considers the key trends in critical event management over the last year As we look back on 2023, it’s vital to reflect on what a transformative year it was in the field of critical event management. Throughout the year, we witnessed escalating geopolitical tensions, a huge surge in security threats encompassing both physical… Read more »

Strategy and speed

Crystal Morin reports on the security demands of the cloud Organisations are using more cloud services every year. According to analyst firm IDC, spending on cloud computing will reach $1.37-trillion by 2027. However, while the technology to build and run in the cloud is pushing ahead, security models and processes have to keep up.Cloud computing… Read more »